100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Exam (elaborations) C836 - Fundamentals of Information Security (WGU)

Puntuación
-
Vendido
-
Páginas
64
Grado
A+
Subido en
11-08-2025
Escrito en
2025/2026

C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS

Mostrar más Leer menos
Institución
C836 - Fundamentals Of Information Security
Grado
C836 - Fundamentals of Information Security











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
C836 - Fundamentals of Information Security
Grado
C836 - Fundamentals of Information Security

Información del documento

Subido en
11 de agosto de 2025
Número de páginas
64
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

8/11/25, 3:16 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXA…




C836 - Fundamentals of Information Security
(WGU)/WGU C836 - FUNDAMENTALS OF
INFORMATION SECURITY LATEST EXAM
QUESTIONS AND ANSWERS



Sometimes called technical Logical Controls
controls, these protect the
systems, networks, and
environments that process,
transmit, and store our
data
based on laws, rules, policies, Administrative Controls
and
procedures, guidelines, and
other items that are "paper"
in nature. They are the
policies that organizations
create for
governance. For example,
acceptable use and email
use policies.
phase of incident response Preparation
consists of all of the
activities that we can
perform, in advance of the
incident itself, in order to
better enable us to
handle it.




… 1/64

,8/11/25, 3:16 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXA…

1. Preparation Incident Response Process
2. Detection and Analysis
(Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity:
document/Lessons learned
where the action begins to Detection & Analysis
happen in our incident
response process. In this
phase, we will detect the
occurrence of an issue and
decide whether or not it is
actually an incident, so
that we can respond
appropriately to it.
involves taking steps to ensure Containment
that the
situation does not cause any
more damage than it already
has, or to at least lessen any
ongoing harm.
attempt to remove the effects Eradication
of the issue from our
environment.
restoring devices or data to Recovery
pre-incident state
(rebuilding systems,
reloading
applications, backup media,
etc.)
determine specifically what Post-incident activity
happened, why it happened,
and what we can do to keep
it from happening again.
(postmortem).
who or what we claim to be. Identity
Simply an assertion.
… 2/64

,8/11/25, 3:16 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXA…

the act of providing who or Authentication
what we claim to be. More
technically, the set of
methods used to establish
whether a claim is true
simply verifies status of ID. Verification
For example, showing your
driver's license at a bar. "Half-
step" between identity and
authentication
• Something Five Different Types of Authentication
you know:
Username/Pass
word/Pin
• Something you have: ID
badge/swipe card/OTP
• Something you are:
Fingerprint/Iris/Retina scan
• Somewhere you are:
Geolocation
• Something you

do:
Handwriting/typin
g/walking
only using one type of Single-factor authentication
authentication
using two different factors of Dual-factor authentication
authentication (2 of the
same factor does not
count )
Use of several (more than Multi-factor authentication
two)
authentication techniques
together, such as passwords
and security tokens, and
geolocation.
process where the session is Mutual Authentication
authenticated on both ends
and just one end.
… 3/64

, 8/11/25, 3:16 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXA…

man-in-the-middle attacks Mutual authentication prevents what kind of attacks?
Something you know Using a password for access is what kind of authentication
Something you are An iris-scan for access is what kind of authentication
Something you have Using a security key-fob for access is what kind of authentication
Something you are Using biometrics are what kind of authentication
universality, permanence, For biometric authentication one must consider
collectibility, performance,
acceptability, and
circumvention
what a user can access, The level of authorization dictates
modify, and delete
The process of determining Authorization
exactly what an
authenticated party can
do
The principle that you Principle of Least Privilege
should only give a party
the bare minimum level of
access it needs to
perform its
job/functionality
tools and systems used to Access Controls are
allow or deny access, limit
access, or revoke access
physical attributes, sets of Access controls can be based on
rules, lists of individuals or
systems, or other, more
complex factors
are lists containing Access control lists (ACLs)
information about what kind
of access certain parties
are allowed to have to a
given system.
read, write, and execute Access control lists generally list which three kinds of permissions
filter access based on Network ACLs
indentifers used for network
transactions, such as

… 4/64
$23.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
NURSEGENERAL Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
82
Miembro desde
1 año
Número de seguidores
4
Documentos
8213
Última venta
1 hora hace
Homeland bookshop

It is a modern bookshop that provide accurate documents such as revision papers ,exams , notes , essays , summaries , flashcards and other study materials. Discover any material you want on my site and feel free to contact me at my email WELCOME ALL !!!! WELCOME ALL!!

4.1

13 reseñas

5
7
4
3
3
1
2
1
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes